Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ACFE > Certified Fraud Examiner > CFE-Investigation

CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Question and Answers

Question # 4

Why is it necessary to image a seized computer's hard drive for forensic analysis?

A.

To prohibit access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

B.

To allow for the analysis of data from a suspect computer without altering or damaging the original data in any way

C.

To create pictures of the suspect computer system and its wires and cables

D.

To enable the retrieval of data from the suspect computer directly via its operating system

Full Access
Question # 5

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Full Access
Question # 6

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Full Access
Question # 7

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Full Access
Question # 8

When documenting interviews, it is best practice for the interviewer to.

A.

Covertly record all interviews with potential suspects.

B.

Note impressions regarding the subject's guilt or innocence.

C.

Err on the side of taking too few notes rather than too many.

D.

Write down verbatim all the information that the subject provides

Full Access
Question # 9

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Full Access
Question # 10

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Full Access
Question # 11

Which of the following types of files is the most difficult to recover during a digital forensic examination?

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Full Access
Question # 12

Which of the following BEST describes the data analytics approach known as predictive analytics?

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Full Access
Question # 13

Which of the following statements concerning access to nonpublic records is MOST ACCURATE?

A.

Once a criminal case is filed, all records obtained by the government are considered public records

B.

Nonpublic records cannot be obtained by subpoena or legal order in a civil action

C.

In most junsdictions. banks are allowed to turn over a suspect's account information directly to a fraud victim when there is adequate evidence of wrongdoing.

D.

The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.

Full Access
Question # 14

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Full Access
Question # 15

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Full Access
Question # 16

Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?

A.

Withdrawing another person's funds using a stolen bank account number and PIN

B.

Digging through a person's trash to obtain their bank account information

C.

Making purchases with a credit card account under a fictitious identity

D.

Falsely claiming to be the spouse of an account holder to access bank records

Full Access
Question # 17

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Full Access
Question # 18

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Full Access
Question # 19

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Full Access
Question # 20

Martin, a fraud examiner, is conducting an interview of Stephanie, a fraud suspect. Although Stephanie heard all of the questions during the introductory part of the interview, she began asking Martin to repeat almost every question when they became more focused If Stephanie is being deceptive, which of the choices below is MOST LIKELY the cause of Stephanie's behavior?

A.

Stephanie is testing Martin to determine whether he is able to ask consistent questions

B.

Stephanie is trying to make sure she understands the question so that she will not make a misstatement.

C.

Stephanie is delaying the answer so that she has more time to think of what to say.

D.

Stephanie is having trouble recalling the events or details related to Martin's questions.

Full Access
Question # 21

Janet suspects that a local restaurant is being used as a front business for a criminal operation. Which of the following types of records would be the MOST LIKELY to help Janet discover who owns the restaurant building?

A.

Commercial filings

B.

Building permit records

C.

Local court records

D.

Voter registration records

Full Access
Question # 22

Which of the following is one of the purposes of closing questions in a routine interview?

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Full Access
Question # 23

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Full Access
Question # 24

Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?

A.

The organizational filings with the government of the jurisdiction in which the company is incorporated

B.

The contractual documents regarding real properly owned by the corporation

C.

The utility records in the municipality where the corporation has its principal office

D.

The shareholder data form filed with the World Bank

Full Access
Question # 25

Fraud examination reports should be written with which of the following audiences in mind?

A.

The media

B.

Opposing legal counsel

C.

Investors and owners

D.

All of the above

Full Access
Question # 26

Which of the following questions would be most effective when starting the calibration process during an interview?

A.

"Did you commit any misconduct against the company?"

B.

"Do you know what the punishment is for violations like this'5"

C.

"Do you know who might have defrauded the company?"

D.

"How many jobs have you had before this one?’

Full Access
Question # 27

Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker. Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:

A.

Interview Dierdre and Matthew separately.

B.

Interview Dierdre and Matthew at the same time, but bring in a second interviewer

C.

Interview Dierdre and Matthew at the same time by himself

D.

Allow Matthew to be present as a silent observer.

Full Access
Question # 28

Which of the following is NOT a best practice for obtaining a signed statement?

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Full Access
Question # 29

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

Full Access
Question # 30

Which of the following questions is MOST HELPFUL for fraud examiners to ask themselves when determining the legality of electronically recording a conversation?

A.

"Can the recording include both audio and video?

B.

"Will the recording equipment produce a digital file?"

C.

"Will the recorded conversation take place before or after work?"

D.

"How long is the anticipated recording expected to last?"

Full Access
Question # 31

Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?

A.

The report should convey all Information provided by witnesses

B.

Only relevant facts that support the fraud allegation should be included in the report

C.

The report writer should avoid technical jargon where possible

D.

Signed copies of the fraud examiner's interview notes should be used to report interview details

Full Access
Question # 32

Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?

A.

Leave the room for a short lime

B.

Ask Manuel to sit up straight

C.

Demand that Manuel stop crying.

D.

Present an alternative question.

Full Access
Question # 33

During an interview with Alice, a suspect in an embezzlement case, the interviewer observes several signs of stress in Alice's behavior, such as shifting around in her chair, exhibiting shallow breathing, and occasionally stuttering during her replies. The interviewer should conclude that these symptoms are caused by deception.

A.

True

B.

False

Full Access
Question # 34

Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?

A.

"Why did you take the money?"

B.

"What do you know about the stolen money?"

C.

"Do you know who took the money''"

D.

"Did you steal the money?"

Full Access
Question # 35

Which of the following is NOT a common use of public sources of information?

A.

Searching an individual's income tax filings

B.

Obtaining background information on individuals

C.

Locating people and their assets

D.

Corroborating or refuting witness statements

Full Access
Question # 36

Thea is conducting a fraud examination for a company and suspects one of the company's vendors (a one-person operation) of fraudulent billing. Thea wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker. If Thea works in a jurisdiction that regulates the distribution of personal credit information, she cannot obtain the suspect's personal credit data under any circumstances.

A.

True

B.

False

Full Access
Question # 37

Why do fraud examiners perform analysis on unstructured, or textual, data?

A.

To determine whether the footnotes to the financial statements are fairly presented

B.

To find an admission of fraud m an email or other communication that can be presented in court

C.

To categorize data to reveal patterns, sentiments, and relationships indicative of fraud

D.

To figure out whether someone is lying or telling the truth based on context duet

Full Access
Question # 38

Gamma, a Certified Fraud Examiner (CFE>, was conducting an admission-seeking interview of Delta, a fraud suspect. Gamma tells Delta, "It isn't like you took something from a friend or neighbor I can see how you could say. 'Well, this would be okay as long as it is the company and not my coworkers.' Isn't that right?" This technique seeks to establish rationalization by:

A.

Convincing DDU that the incident had suffcinet justification

B.

Reducing Delta's perception of the legal seriousness of the matter

C.

Depersonalizing the victim

D.

Developing revenge as a motive

Full Access
Question # 39

Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.

A.

True

B.

False

Full Access
Question # 40

A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?

A.

The suspect's claim will succeed because the investigator used deceit

B.

The suspect's claim will succeed because the investigator lacked probable cause

C.

The suspect's claim will fail because the investigator had adequate predication

D.

The suspect's claim will fail because the investigator is a law enforcement agent

Full Access
Question # 41

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

A.

Tracing loan proceeds can reveal previous civil offenses committed by the subject

B.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts

C.

Tracing loan proceeds can uncover previously unknown witnesses

D.

Tracing loan proceeds can determine if hidden accounts were used for loan payments.

Full Access
Question # 42

Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions

A.

True

B.

False

Full Access
Question # 43

Tyson, a fraud examiner, is planning an interview with Brianna. the girlfriend of the central suspect in Tyson's investigation. Previous interviews with others have revealed that Brianna tends to be very protective of her boyfriend How should Tyson approach the interview with Brianna?

A.

Avoid interviewing Brianna if possible due to Brianna's potential volatility.

B.

Conduct the interview with as little notice as possible so Brianna will be unprepared

C.

Provide Brianna with advance notice prior to the interview to inhibit resentment.

D.

Ask Brianna when she would prefer to be interviewed in an effort to provoke cooperation.

Full Access
Question # 44

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

A.

The approximate beginning and end dates of the fraud

B.

A statement from Rachel that her conduct was an accident

C.

A general estimate of the amount of money involved

D.

Rachel's motive for the offense

Full Access
Question # 45

Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?

A.

"Did you steal the money?"

B.

'What did you do with the money?"

C.

"Why did you take the money?"

D.

"How much of the money do you have left?"

Full Access
Question # 46

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online records companies are difficult to find.

B.

Fraud examiners must validate the accuracy of the records obtained online

C.

The online record might only be a brief abstract of the original.

D.

Fraud examiners often must search for public records in multiple jurisdictions.

Full Access
Question # 47

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

A.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence But not inculpatory evidence

B.

During the analysis phase, it is best to use just one forensic tool for identifying, extracting, and collecting digital evidence

C.

The primary concern when analyzing digital evidence is to maintain the integrity of the data at all times

D.

The analysis phase of digital forensic investigations should not commence unless it is venfied that the suspect devices do not contain relevant data

Full Access
Question # 48

Misty, a fraud investigator, is interviewing Larry, who she suspects has been embezzling company funds. Which of the following is NOT a recommended sequence in which Misty should ask Lam/ questions?

A.

Ask questions in random order to prevent Larry from knowing what question comes next.

B.

Start with questions about known information and work toward unknown information

C.

Start with general questions and move toward specific questions

D.

Ask questions seeking general information before seeking details

Full Access
Question # 49

When reporting the results of a fraud examination, it is BEST to include copies (not originals) of important documents in the formal report.

A.

True

B.

False

Full Access
Question # 50

Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?

A.

Forensic methodology

B.

Fraud theory

C.

Fraud assessment

D.

Fraud examination

Full Access
Question # 51

Butler, a Certified Fraud Examiner (CFE), needs to obtain a copy of a statement that the chief executive officer (CEO) of Accord Investments, a venture capital firm, posted on the firm's website sometime last year. Unfortunately, the quote has been removed from the website. Which of the following resources would be the BEST choice for Butler to consult to find an earlier version of the web page that he needs?

A.

The invisible archives

B.

The free web

C.

The internet archives

D.

The deep web

Full Access